Lets have a talk about how safe you really feel on the internet... #foxacid

in #life8 years ago

Through recent research I have discovered the term "foxacid" which refers to a tool developed by the NSA to hack into targeted systems by impersonate legitimate web sites. That is all fine if the target is legitimate and the attacker is trust worthy. The image below does not instill that confidence in me with the main ingredient being sadism. There is also an issue of this tool falling in the wrong hands, how would the average person defend themselves?

Let me know your thoughts an opinions in the comments below. I have personally been researching how to tighten up my own security protocols. I downloaded qubes but am having trouble using it, anyone have experience?

https://www.qubes-os.org/

Thanks!

Source:

https://www.washingtonpost.com/news/the-switch/wp/2013/12/30/look-at-this-amazing-drawing-the-nsa-made-for-its-hacking-system

Sort:  

I have been using Tails. It was really easy to setup and if you clone the OS you can run an encrypted persistant storage and secure all your files and App data. Also the OS leaves no trace the only strorage used is your RAM.

I read somewhere that it was compromised, will have to find the source.

There were some security holes in version 2.6. The 2.7 update resolved all of the issues.

Has to do with all of the exit nodes being comprimised...

http://www.makeuseof.com/tag/priority-wretched-hive-scum-villainy-5-ways-stay-safe-bad-tor-exit-nodes/

Mononymous Swedish security researcher “Chloe,” developed a clever technique for tricking corrupt nodes into outing themselves. Basically, it works like this: Chloe set up a website, using a legitimate-looking domain names and web design, to serve as a honeypot. For this specific test, she created a domain intended to resemble a Bitcoin merchant. She then downloaded a list of every exit node, logged onto Tor, and used each exit node in turn to log into the site, using a unique account specific to the exit node in question.

Then she sat back and waited for a month. Any nodes that were attempting to steal login credentials would see her login, steal her user name and password, and attempt to use it. Her honeypot websites would notice the multiple login attempts, and make a note. Because the passwords are unique to each node, Chloe can pin down exactly which node took the bait.

The results of the experiment are interesting. Of about 1400 exit notes, 16 attempted to steal the password and log in. This number isn’t too alarming on the face of it, but there are a few facts it’s worth remembering.

Coin Marketplace

STEEM 0.16
TRX 0.15
JST 0.030
BTC 59096.52
ETH 2516.65
USDT 1.00
SBD 2.46